Skip to main content

36
RESULTS
rss


PART OF
Shmoocon
Hacker Conferences
Media Type
36
movies
Year
36
(No Date)
Collection
Creator
1
kingtuna and thex1le
1
navas, k - cadet, us military academy, brasefield, d - cadet, us military academy, grunzweig, n - cadet, us military academy, oconnor, t - faculty advisor, us military academy
1
tom eston, kevin johnson, robin wood
Language
36
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2010
movies
eye 62
favorite 0
comment 0
De Gustibus
Shmoocon 2010
movies
eye 56
favorite 0
comment 0
Ring 1 Vs Ring 2
Shmoocon 2010
movies
eye 55
favorite 0
comment 0
DiY Hard Drive Diagnostics
Shmoocon 2010
movies
eye 43
favorite 0
comment 0
Guest Stealing The Vmware Way
Shmoocon 2010
by Tom Eston, Kevin Johnson, Robin Wood
movies
eye 41
favorite 0
comment 0
In Social Zombies II: Your Friends Need More Brains, Tom Eston, Kevin Johnson and Robin Wood continue the Zombie invasion from "Social Zombies: Your Friends want to eat Your Brains" presented at DEFCON 17. This presentation will further examine the risks of social networks and then present new techniques and tools that can be used to exploit these issues. This presentation begins by discussing new twists on existing privacy concerns that are caused by the trust mass that is social...
Shmoocon 2010
movies
eye 38
favorite 0
comment 0
Cyborg Information Security
Shmoocon 2010
movies
eye 38
favorite 0
comment 0
Pulling The Plug
Shmoocon 2010
by Navas, K - Cadet, US Military Academy, Brasefield, D - Cadet, US Military Academy, Grunzweig, N - Cadet, US Military Academy, OConnor, T - Faculty Advisor, US Military Academy
movies
eye 38
favorite 0
comment 0
This talk will discuss an implementation of a honeyclient framework for mobile devices. In wireless environments, honeypots typically mimic access points or a single protocol of a device. The authors implemented a framework that can simultaneously imitate the WiFi, Bluetooth, and GPS behavior of multiple instances of different devices. This talk focuses on the challenges associated with accurately pretending to be somebody you are not and how honeyclients can contribute to the future of mobile...
Shmoocon 2010
by Kingtuna and TheX1le
movies
eye 37
favorite 0
comment 0
Wireless de-authentication and disassociation are nothing new. The problem with it stems from the fact that tools are either too limited in scope IE... aireplay-ng or way to broad and no discriminating IE.... Mdk3. Enter Airdrop-ng. Taking the best from each and built around a solid rule parser you can preform both a very targeted attack or unleash the packets from hell and rain down packets of death on the wireless networks of the world. Airdrop-ng is more then just a deauth tool its a client...
Shmoocon 2010
movies
eye 37
favorite 0
comment 0
Back To The Glass House
Shmoocon 2010
movies
eye 37
favorite 0
comment 0
Build Your Own Predator
Shmoocon 2010
movies
eye 36
favorite 0
comment 0
Cracking The Foundation
Shmoocon 2010
movies
eye 35
favorite 0
comment 0
Keynote
Shmoocon 2010
movies
eye 34
favorite 0
comment 0
GPU Vs CPU Supercomputing Shootout
Shmoocon 2010
movies
eye 30
favorite 0
comment 0
The Current State Of Computer Security
Shmoocon 2010
movies
eye 28
favorite 0
comment 0
Bluetooth Keystrokes
Shmoocon 2010
movies
eye 27
favorite 0
comment 0
Info Disclosure Via P2P
Shmoocon 2010
movies
eye 26
favorite 0
comment 0
Tales From The Crypto
Shmoocon 2010
movies
eye 26
favorite 0
comment 0
GSM Srsly
Shmoocon 2010
movies
eye 23
favorite 0
comment 0
Flying Instruments Only
Shmoocon 2010
movies
eye 23
favorite 0
comment 0
The New World Of Smartphone Security
Shmoocon 2010
movies
eye 22
favorite 0
comment 0
JSunPack Network
Shmoocon 2010
movies
eye 22
favorite 0
comment 0
How To Be An RSol
Shmoocon 2010
movies
eye 21
favorite 0
comment 0
The Friendly Traitor
Shmoocon 2010
movies
eye 21
favorite 0
comment 0
Windows File Pseudonyms
Shmoocon 2010
movies
eye 21
favorite 0
comment 0
Learning By Breaking
Shmoocon 2010
movies
eye 20
favorite 0
comment 0
Infrastructual Weaknesses In Distrib Wireless Comms
Shmoocon 2010
movies
eye 19
favorite 0
comment 0
WLCCP Analysis Of Potentially Flawed Protocol
Shmoocon 2010
movies
eye 19
favorite 0
comment 0
BaSO4
Shmoocon 2010
movies
eye 18
favorite 0
comment 0
Better Approaches To Physical Tamper Detection
Shmoocon 2010
movies
eye 17
favorite 0
comment 0
Blackberry Mobile Spyware
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
Recoving Info From VMs & Hyperr Environments
Shmoocon 2010
movies
eye 16
favorite 0
comment 0
Splendiferous Story
Shmoocon 2010
movies
eye 15
favorite 0
comment 0
Detecting Rogue APs Using Clock Skews
Shmoocon 2010
movies
eye 14
favorite 0
comment 0
Closing
Shmoocon 2010
movies
eye 14
favorite 0
comment 0
0wn The Con